Operations | Monitoring | ITSM | DevOps | Cloud

Blog

The Dark Side of DevSecOps and the case for Governance Engineering

For today’s software organizations security has never been more top of mind. On one side there is the present and growing threat of being hacked by malicious actors, set out in Crowdstrike’s recent Global threat report. And, on the other, there is a wave of cybersecurity regulation from the government to mitigate such cybersecurity vulnerabilities.

The Swedbank Outage shows that Change Controls don't work

This week I’ve been reading through the recent judgment from the Swedish FSA on the Swedbank outage. If you’re unfamiliar with this story, Swedbank had a major outage in April 2022 that was caused by an unapproved change to their IT systems. It temporarily left nearly a million customers with incorrect balances, many of whom were unable to meet payments.

Cloud Reverse Migration: A Comprehensive Guide

The rapid technological advancements in the last decade led to a massive migration of data and applications from on-premise environments to the cloud. While this cloud migration trend dominated the IT world, a recent paradigm shift has emerged that’s moving in the opposite direction – ‘Cloud Reverse Migration’ or ‘Cloud Repatriation’.

How to throw custom exceptions inside Logic Apps: Using default capabilities - Avoiding too many condition actions (Part III)

Welcome to the third part of this series of blog posts on How to throw custom exceptions inside Logic Apps. In this series of five blogs, I will cover throwing custom exceptions in Logic Apps. I will cover the following topics: In this third approach, we are going to do a considerable fine-tuning of the previous approach, keeping the same capability to define custom error messages but redesigning the business logic in order to minimize the number of actions and optimize performance.

Enhancing Preventive Maintenance Programs with CMMS Software

Computerized Maintenance Management System (CMMS) software is an innovative tool that is used in many industries for managing maintenance operations. It is designed to help businesses streamline their maintenance processes, reduce downtime, and improve the overall efficiency of their operations. CMMS software can be used to track and manage a wide range of maintenance activities, including preventive maintenance, corrective maintenance, and predictive maintenance.

Effective Communication Strategies for Facility Teams

In any organization, effective communication plays a vital role in achieving operational success. Facility teams, responsible for ensuring the smooth functioning of physical infrastructure, face unique challenges due to the diverse nature of their roles. From maintenance and repairs to managing vendors and responding to emergencies, facility teams need to be equipped with strong communication strategies to enhance coordination, streamline processes, and maximize productivity.

Real User Monitoring - Beginners Guide

Do you know what your website users are really experiencing? Are they satisfied with your website's performance? Are they able to easily navigate and find what they're looking for? Real User Monitoring (RUM) is a powerful technique that can answer these questions and more. By collecting and analysing data on real user interactions, RUM provides valuable insights into user behaviour, website or application performance, and overall user experience.

Data Shows Outage Time & Costs are Increasing - 3 Solutions You Should Consider

The Uptime Institute recently released its Annual Outage Analysis 2023 report. Overall, the report highlights the increasing costs, frequency, and duration of outages, the prominent role of cloud and digital services in outages, the shortcomings of service providers, and the need to address human error and management failures. It also underscores the ongoing challenges of handling failures in complex distributed architectures.

SIEM Tools: For Enhanced Threat Intelligence and System Security

SIEM is an overarching mechanism combining Security Event Management (SEM) and Security Information Management (SIM). It is a combination of different tools such as Event Logs, Security Event Logs, Event Correlation, SIM etc. These work in tandem to provide you an up-to-date threat intelligence infrastructure and enhanced security for your applications and hardware.